The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Domain name system is among the core part of TCP/IP protocol suite and the standard protocol used by the Internet. The domain name system consists of mapped website names with Internet protocol, which facilitates browsing by not requiring users to remember numeric notation addresses. The nature of the system, which involves transferring information in plain text, makes it vulnerable to security attacks...
Networking has become an essential factor in daily life and activities where the major problem in network security is the safety of the transfer information. The infrastructure for the networking is the TCP/IP suite, and the address resolution protocol is the core part of the standard which maps the logical address into a physical address. Address resolution protocol is defined as a stateless protocol...
MapReduce is a popular programming model and an associated implementation for parallel processing big data in the distributed environment. Since large scaled MapReduce data centers usually provide services to many users, it is an essential problem to preserve the privacy between different applications in the same network. In this paper, we propose SDPMN, a framework that using software defined network...
With the development of computer science, desktop virtualization technology is more and more popular. In virtualized desktop, it is a very significant research to share periphery devices in the client-end computer seamlessly. We implement a device sharing mechanism to extend the universal serial bus in client-end host to the network for server-end host using transparently. This virtual device bus...
Inspired by the concept of cloud computing, the construction of HPC Cloud with traditional HPC resources not only provides new opportunities to address the challenges to the traditional HPC, but also brings many exciting research problems. One of them is how to reduce the network overhead of virtual cluster in HPC cloud. In order to resolve the problem, this paper presents the design and implementation...
In data centers and cloud computing environments, the number of virtual machines (VMs) increases when the number of service requests increases. Since services are invoked on demand, the corresponding virtual machines will be created and shut down frequently. This makes the time of starting a virtual machine a crucial performance bottleneck for services in data centers. Besides, if virtual machines...
Peer-to-Peer SIP is proposed to leverage Peer-to-Peer computing to control multimedia sessions in a decentralized manner. A lot of companies can be benefited if conventional SIP environment does not require the configuration and maintenance of central servers. However, existing P2PSIP systems put too much emphasis on the decentralization of SIP elements and the briefness of distribution. To some extent,...
Development of Internet brings the great increasing communication requirement. This demand impels the developing progress of Voice over Internet Protocol (VoIP). It is difficult to supply the high quality user experience for VoIP services, which has brought great challenges to VoIP developer because of the dynamic property of Internet. We obtain the following results in lots of existing VoIP systems:...
When extending peer-to-peer live streaming system to IEEE 802.11-based wireless network, service guarantee for inter-domain movement is an obstacle since IEEE 802.11 has no QoS maintenance mechanism for it. The stream system must consider it itself. As a peer roams among adjacent networks, the streaming service will be interrupted by the disconnection of wireless network path and IP address changes...
During the development of a distributed application, programmers usually involve many programs. These programs have different IP addresses and different ports. Sometimes, they even have a same port. For instance, in P2P environment, peers usually use the same port to communicate with each other. We often need tens of computers to develop such a distributed application. Unfortunately, not each one...
With the development of virtualization technology, it??s desirable to deploy virtual machines to high performance clusters used for data centers. VNIX, developed in Services Computing Technology and System lab, tries to help cluster administrators to manage a large number of virtual machines (VMs) distributed on clusters. To reduce the complexity of virtualization management, VNIX provides a whole-set...
Peer-to-peer (P2P) technology encounters serious methodological limitations to guarantee the quality of services (QoS) of P2P networks with very few peers. In this paper, we propose multiple-access channel model (MACM) to merge different P2P networks as a whole to share their data-transfer capability. The model abstracts the interlaced data links between peers as logical data channels according to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.